Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
35d099e967a597996547dc71e00dd023_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35d099e967a597996547dc71e00dd023_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
35d099e967a597996547dc71e00dd023_JaffaCakes118.html
-
Size
53KB
-
MD5
35d099e967a597996547dc71e00dd023
-
SHA1
75e18c9e952058b1681a9f4f04cdae1b868490da
-
SHA256
45745d83886b9e46c2859bbb351d579bf113ac2833b745e80f5d4673c4a44461
-
SHA512
c3643aa624381ffe66e93c87ebebdcd9d631a452907a5896a3464856a9eb021be89efda6728259468ab471aeb3ebc3d3ddd4cce0d90896061674b5018c7f11b2
-
SSDEEP
1536:CkgUiIakTqGivi+PyUJrunlY/63Nj+q5VyvR0w2AzTICbbUoo/t9M/dNwIUEDmD9:CkgUiIakTqGivi+PyUJrunlY/63Nj+qT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4868 msedge.exe 4868 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2172 4868 msedge.exe 83 PID 4868 wrote to memory of 2172 4868 msedge.exe 83 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4788 4868 msedge.exe 84 PID 4868 wrote to memory of 4508 4868 msedge.exe 85 PID 4868 wrote to memory of 4508 4868 msedge.exe 85 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86 PID 4868 wrote to memory of 3416 4868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35d099e967a597996547dc71e00dd023_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eb6c46f8,0x7ff9eb6c4708,0x7ff9eb6c47182⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,11727874320408653431,13594779384333769873,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
403B
MD5322f5286eded7c61af445880f4b0f0d8
SHA15e74fbb3023d58b983fa404314d79ba72d01c15f
SHA25682ba843c825e54d389eb9cc943d12dfbac92f3a5de31806479235f2195698c46
SHA5122323d22d734d6c197f7c84ac4ad10b396328b640e60503b2c641ad7d8ad9777b105d5a02022c820d68938adebdb294b309d4f64003a5d47b0d67357bc13c0885
-
Filesize
6KB
MD5f8bec1424622cd99677dbec179d8062e
SHA12e4f1f6b3bd54c48cf3f5cd58d9274f4d6e21713
SHA256c9667eeff74d44877221f8794a5d92509285d01f5974404c79b4dc962769bf72
SHA5120b599f8f02bf1bbbf41c45f500c0f66be9ba3de9d400548b226820aad278cf0a94e0cb6c20e46ca4b6ef9b79308471cce24651d70e7fc82c5e56b5c0084e7656
-
Filesize
6KB
MD520e8dec1c709542eb3c03a88598697b5
SHA1c29d52aac46633b01e030d937195acf252c66f65
SHA256a210a0b4da2f9f0f70e6415b02bcc337a8037be56d7f7f01f54fffe5aa418a5b
SHA512483c3ca085859114040143d6f3a2e6dc909d77b095a3985eb090454be42c463d0331679503291a09fa67c8e08501a556311af002961fb48cc79dc24b1e546852
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f15db08dbf02154ca772b3dd84812b46
SHA10190eea412f6ae3f237f044222dd30e2eed441af
SHA2560bcc80ea9c4d797cb90fa86cb42c93bd2e2974e64061438902415b0d79345d10
SHA5126197713af1be2be11f6b020e9410e40530dd47ad51255c819a7ca3219b7e6e9669c955eeda014167aa7b94a05f1a8ef0c12f566ff014cb88d78750b99423baa7